Methodology for Assessing Possible Damage from the Security Violation of the Information of the Automated System
Тип публикация:
Journal ArticleИзточник:
Yzvestyia TRTU, Volume 4, Issue 33, p.27–31 (2003)- видяно 1986 пъти
- Google Scholar
- RTF
- EndNote XML